AT-S63 Management Software Features Guide
Section VI: Virtual LANs
305
Guidelines
Following are the guidelines for implementing protected ports VLANS:
A protected ports VLAN should contain a minimum of two groups. A
protected ports VLAN of only one group can be replaced with a port-
based or tagged VLAN instead.
A protected ports VLAN can contain any number of groups.
A group can contain any number of ports.
The ports of a group can be tagged or untagged.
Each group must be assigned a unique group number on the switch.
The number can be from 1 to 256.
A protected ports VLAN can contain more than one uplink port.
The switch can support up to a total of 4094 port-based, tagged,
protected ports, and MAC address-based VLANs.
Uplink ports can be either tagged or untagged.
Uplink ports can be shared among more than one protected ports
VLAN, but only if they are tagged.
A switch can contain a combination of port-based and tagged VLANs
and protected ports VLANs.
A port that is a member of a group in a protected ports VLAN cannot
be a member of a port-based or tagged VLAN.
A group can be a member of more than one protected ports VLAN at a
time. However, the port members of the group must be identical in both
VLANs and the ports must be tagged.
You cannot create protected ports VLANs when the switch is operating
in a multiple VLAN mode.
An untagged port of a protected ports VLAN can not be made an
untagged member of another protected ports VLAN until it is first
removed from its current VLAN assignment and returned to the
Default_VLAN.
The switch must be set to the user-configured VLAN mode to support
protected ports VLANs.
Содержание AT-S63
Страница 14: ...Figures 14 ...
Страница 18: ...Tables 18 ...
Страница 28: ...28 Section I Basic Operations ...
Страница 58: ...Chapter 1 Overview 58 ...
Страница 76: ...Chapter 2 AT 9400Ts Stacks 76 Section I Basic Operations ...
Страница 96: ...Chapter 5 MAC Address Table 96 Section I Basic Operations ...
Страница 114: ...Chapter 8 Port Mirror 114 Section I Basic Operations ...
Страница 116: ...116 Section II Advanced Operations ...
Страница 146: ...Chapter 12 Access Control Lists 146 Section II Advanced Operations ...
Страница 176: ...Chapter 14 Quality of Service 176 Section II Advanced Operations ...
Страница 196: ...196 Section III Snooping Protocols ...
Страница 204: ...Chapter 18 Multicast Listener Discovery Snooping 204 Section III Snooping Protocols ...
Страница 216: ...Chapter 20 Ethernet Protection Switching Ring Snooping 216 Section III Snooping Protocols ...
Страница 218: ...218 Section IV SNMPv3 ...
Страница 234: ...234 Section V Spanning Tree Protocols ...
Страница 268: ...268 Section VI Virtual LANs ...
Страница 306: ...Chapter 27 Protected Ports VLANs 306 Section VI Virtual LANs ...
Страница 320: ...320 Section VII Internet Protocol Routing ...
Страница 360: ...Chapter 30 BOOTP Relay Agent 360 Section VII Routing ...
Страница 370: ...Chapter 31 Virtual Router Redundancy Protocol 370 Section VII Routing ...
Страница 372: ...372 Section VIII Port Security ...
Страница 402: ...Chapter 33 802 1x Port based Network Access Control 402 Section VIII Port Security ...
Страница 404: ...404 Section IX Management Security ...
Страница 436: ...Chapter 36 PKI Certificates and SSL 436 Section IX Management Security ...
Страница 454: ...Chapter 38 TACACS and RADIUS Protocols 454 Section IX Management Security ...
Страница 462: ...Chapter 39 Management Access Control List 462 Section IX Management Security ...
Страница 504: ...Appendix B SNMPv3 Configuration Examples 504 Security Model Security Level Storage Type SNMPv3 Parameters Continued ...
Страница 532: ...Appendix D MIB Objects 532 ...